Information Security

Left Nav

INFOSEC NEWS AND ALERTS

The Office of Information Security (InfoSec) offers the college community a resource to assist in securing the rich and expansive data the college manages. Through training, community outreach, and continuous awareness, InfoSec strives to strengthen and secure not only our processes, procedures, and technology resources, but also the most vulnerable aspect of our security posture - people.

For more information about various information security topics, including passwords, training, policies and more, visit our InfoSec Links page.

InfoSec Links

Curious about the mission, vision and principles of the Office of Information Security? Visit this page to understand our motivations and goals.

WHAT WE DO

  • Collaboratively draft, review, validate and publish information security policies, procedures and guidelines.
  • Obtain, distribute and manage security awareness training for the entire college community.
  • Conduct ongoing risk assessment and policy compliance audits based on industry standard benchmarks.
  • Stay informed of current security risks, applying this knowledge to ensure that the campus is protected.
  • Regularly inform the community of new risks, mitigation techniques, and secure practices, through events such as the annual National Cyber-Security Awareness Month and other coordinated events.
  • Help the community understand that information security is a shared responsibility.
  • Organize the Information Security Advisory Group, which is designed to discuss and make recommendations on how the college should prepare for and respond to, security risks and incidents.
  • Work with other Office for Information Technology areas and college departments to ensure that the confidentiality, integrity and availability of data is considered from the beginning of any new initiative.
  • Respond to information security incidents, providing coordination, guidance, communication, and forensic analysis. 
  • Continuously attempt to address the intersection of three key questions - What is important? What is dangerous? What is real?

 

 Back to Top

Footer Menu